Intrusion Detection

Intrusion Detection news, information, and how-to advice

A mug with the words GitHub Social Coding

honey pot

Spread honeypots over your defense plan

Deployed properly, a honeypot catches intruders like flies to, well, you know what. They deliver enormous value for a modicum of up-front effort

threat intelligence secrets sharing

5 steps to make threat intelligence work for you

Determining your top threats is not rocket science -- and the effort will pay off in successful mitigations

Inspecting a tablet magnifying glass businessman

7 keys to better risk assessment

When bad guys penetrate a network, too many defenders worry about what they stole rather than how they broke in. Focus on causes! Here's how

arithmetic math graffiti

Math to the rescue! Try this novel hacking defense

Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does

15 10cwdsecurity

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor?

Police break up cybergang that stole over $15 million from banks

Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards

IBM opens up its threat data as part of new security intelligence sharing platform

The IBM X-Force Exchange platform will allow companies to share and compare data from security incidents

nac 1

Review: Portnox, Extreme lead NAC pack

Network Access Control (NAC) products continue to get better and easier to use

securiy companies watch

10 security startups to watch in 2015

With IT spending on security on the increase, here are 10 security newcomers hoping to be worthy of corporate customers

Load More